From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems., , , , , , , , и . USENIX Security Symposium, стр. 2579-2596. USENIX Association, (2021)VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol., , , и . AsiaCCS, стр. 182-195. ACM, (2022)Trust Management.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Oblivious signature-based envelope., , и . PODC, стр. 182-189. ACM, (2003)An Empirical Study of Mnemonic Sentence-based Password Generation Strategies., , , , и . ACM Conference on Computer and Communications Security, стр. 1216-1229. ACM, (2016)Denial of service attacks and defenses in decentralized trust management., , , и . Int. J. Inf. Sec., 8 (2): 89-101 (2009)OACerts: Oblivious Attribute Certificates., и . ACNS, том 3531 из Lecture Notes in Computer Science, стр. 301-317. (2005)A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols., и . ICICS, том 4307 из Lecture Notes in Computer Science, стр. 122-138. Springer, (2006)PrivSyn: Differentially Private Data Synthesis., , , , , , , и . CoRR, (2020)PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols., , , , , , и . CoRR, (2020)